harbor/docs/1.10/administration/vulnerability-scanning/_index.md

19 lines
1.5 KiB
Markdown
Raw Normal View History

---
title: Vulnerability Scanning
weight: 35
---
2019-10-17 19:00:00 +02:00
2019-12-13 15:08:40 +01:00
Harbor provides static analysis of vulnerabilities in images through the open source [Clair](https://github.com/coreos/clair) project.
2019-10-17 19:00:00 +02:00
{{< important >}}
Clair is an optional component. To be able to use Clair you must have enabled Clair when you installed your Harbor instance.
{{< /important >}}
2019-10-17 19:00:00 +02:00
You can also connect Harbor to your own instance of Clair or to additional vulnerability scanners by using an interrogation service. You configure additional scanners in the Harbor interface, after you have installed Harbor. For the list of additional scanners that are currently supported, see the [Harbor Compatibility List](../../install-config/harbor-compatibility-list.md#scanner-adapters).
2019-12-13 15:08:40 +01:00
It might be necessary to connect Harbor to other scanners for corporate compliance reasons, or because your organization already uses a particular scanner. Different scanners also use different vulnerability databases, capture different CVE sets, and apply different severity thresholds. By connecting Harbor to more than one vulnerability scanner, you broaden the scope of your protection against vulnerabilities.
2020-02-20 13:02:41 +01:00
For information about installing Harbor with Clair, see the [Run the Installer Script](../../install-config/run-installer-script.md).
2019-12-13 15:08:40 +01:00
You can manually initiate scanning on a particular image, or on all images in Harbor. Additionally, you can also set a policy to automatically scan all of the images at specific intervals.